<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connecting Remote Gateway SMB to SMS and up VPN tunnel site-to-site. Different countries. in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239968#M12015</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Greetings!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I’d like to ask for assistance and advice regarding the setup of a site-to-site VPN tunnel. On one side, the provider offers a static IP address, while on the other side, the provider assigns a dynamic IP to the router. The router then provides a private (local) IP address to the SMB (Spark) gateway. Has anyone had similar experience?&lt;/P&gt;&lt;P&gt;How is it possible to manage the remote gateway (the one with the router using a dynamic IP)? Connecting to the SMB and setting up policies is more successful from the SMB gateway side than from the management side. However, attempts to manage it from the server side are unsuccessful. Policies don’t apply, and the tunnel isn’t established.&lt;/P&gt;&lt;P&gt;The two gateways that should be connected by the tunnel are in different countries. I’d greatly appreciate any help. Is it perhaps necessary to forward ports on the provider’s router?&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 13:30:59 GMT</pubDate>
    <dc:creator>Ok1</dc:creator>
    <dc:date>2025-01-29T13:30:59Z</dc:date>
    <item>
      <title>Connecting Remote Gateway SMB to SMS and up VPN tunnel site-to-site. Different countries.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239968#M12015</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Greetings!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I’d like to ask for assistance and advice regarding the setup of a site-to-site VPN tunnel. On one side, the provider offers a static IP address, while on the other side, the provider assigns a dynamic IP to the router. The router then provides a private (local) IP address to the SMB (Spark) gateway. Has anyone had similar experience?&lt;/P&gt;&lt;P&gt;How is it possible to manage the remote gateway (the one with the router using a dynamic IP)? Connecting to the SMB and setting up policies is more successful from the SMB gateway side than from the management side. However, attempts to manage it from the server side are unsuccessful. Policies don’t apply, and the tunnel isn’t established.&lt;/P&gt;&lt;P&gt;The two gateways that should be connected by the tunnel are in different countries. I’d greatly appreciate any help. Is it perhaps necessary to forward ports on the provider’s router?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 13:30:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239968#M12015</guid>
      <dc:creator>Ok1</dc:creator>
      <dc:date>2025-01-29T13:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Remote Gateway SMB to SMS and up VPN tunnel site-to-site. Different countries.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239972#M12016</link>
      <description>&lt;P&gt;In this setting, only the SMB behind the router with dynamic IP is able to initiate the VPN tunnel. So it would make more sense to configure it as locally managed and use a permanent tunnel. But you can open a SR# with CP TAC to get more information about possible configurations fitting your purpose !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 14:10:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239972#M12016</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-01-29T14:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting Remote Gateway SMB to SMS and up VPN tunnel site-to-site. Different countries.</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239980#M12017</link>
      <description>&lt;P&gt;My 2 cents, static IP is in most cases the best option. Even if you do a local mgmt what if the ISP changes the IP? How are you going to manage it from home? Then you need to find a way like manage via tunnel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My experience to connect to central mgmt dynamic IP can work but could be a bit more complex. Static ip will make it more easy for you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 15:32:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Connecting-Remote-Gateway-SMB-to-SMS-and-up-VPN-tunnel-site-to/m-p/239980#M12017</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-29T15:32:31Z</dc:date>
    </item>
  </channel>
</rss>

